説明
Perl-Compatible Regular Expression (PCRE) library before 6.7 allows context-dependent attackers to cause a denial of service (error or crash) via a regular expression that involves a "malformed POSIX character class", as demonstrated via an invalid character after a [[ sequence.
AI分析AIによる分析
影響を受ける製品
perlpcre
0.91
perlpcre
0.92
perlpcre
0.93
perlpcre
0.94
perlpcre
0.95
perlpcre
0.96
perlpcre
0.97
perlpcre
0.98
perlpcre
0.99
perlpcre
1.00
perlpcre
1.01
perlpcre
1.02
perlpcre
1.03
perlpcre
1.04
perlpcre
1.05
perlpcre
1.06
perlpcre
1.07
perlpcre
1.08
perlpcre
1.09
perlpcre
2.0
perlpcre
2.01
perlpcre
2.02
perlpcre
2.03
perlpcre
2.04
perlpcre
2.05
perlpcre
2.06
perlpcre
2.07
perlpcre
2.08
perlpcre
3.0
perlpcre
3.1
perlpcre
3.2
perlpcre
3.3
perlpcre
3.4
perlpcre
3.5
perlpcre
3.6
perlpcre
3.7
perlpcre
3.8
perlpcre
3.9
perlpcre
4.0
perlpcre
4.1
perlpcre
4.2
perlpcre
4.3
perlpcre
4.4
perlpcre
4.5
perlpcre
5.0
perlpcre
6.0
perlpcre
6.1
perlpcre
6.2
perlpcre
6.3
perlpcre
6.4
perlpcre
6.5
perlpcre
6.6
参照
- http://lists.opensuse.org/opensuse-security-announce/2008-01/msg00006.html
- http://secunia.com/advisories/28041
- http://secunia.com/advisories/28658
- http://support.avaya.com/elmodocs2/security/ASA-2007-505.htm
- http://www.mandriva.com/security/advisories?name=MDVSA-2008:030
- http://www.pcre.org/changelog.txt
- http://www.redhat.com/support/errata/RHSA-2007-1059.htmlPatch
- http://www.redhat.com/support/errata/RHSA-2007-1068.htmlPatch
- http://www.securityfocus.com/bid/26725
- https://bugzilla.redhat.com/show_bug.cgi?id=384761
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10985
- http://lists.opensuse.org/opensuse-security-announce/2008-01/msg00006.html
- http://secunia.com/advisories/28041
- http://secunia.com/advisories/28658
- http://support.avaya.com/elmodocs2/security/ASA-2007-505.htm
- http://www.mandriva.com/security/advisories?name=MDVSA-2008:030
- http://www.pcre.org/changelog.txt
- http://www.redhat.com/support/errata/RHSA-2007-1059.htmlPatch
- http://www.redhat.com/support/errata/RHSA-2007-1068.htmlPatch
- http://www.securityfocus.com/bid/26725